{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,15]],"date-time":"2024-09-15T14:29:02Z","timestamp":1726410542376},"publisher-location":"Berlin, Heidelberg","reference-count":9,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642354038"},{"type":"electronic","value":"9783642354045"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012]]},"DOI":"10.1007\/978-3-642-35404-5_8","type":"book-chapter","created":{"date-parts":[[2012,12,7]],"date-time":"2012-12-07T00:55:14Z","timestamp":1354841714000},"page":"86-97","source":"Crossref","is-referenced-by-count":3,"title":["Fixed Points of Special Type and Cryptanalysis of Full GOST"],"prefix":"10.1007","author":[{"given":"Orhun","family":"Kara","sequence":"first","affiliation":[]},{"given":"Ferhat","family":"Karako\u00e7","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"8_CR1","unstructured":"Courtois, N.T.: Algebraic Complexity Reduction and Cryptanalysis of GOST. IACR Cryptology ePrint Archive, 2011:626 (2011)"},{"key":"8_CR2","unstructured":"Courtois, N.T., Misztal, M.: Differential Cryptanalysis of GOST. IACR Cryptology ePrint Archive, 2011:312 (2011)"},{"key":"8_CR3","unstructured":"Courtois, N.T.: A Differential Attack on Full GOST. IACR Cryptology ePrint Archive, 2012:138 (2012)"},{"issue":"1","key":"8_CR4","doi-asserted-by":"publisher","first-page":"2","DOI":"10.1080\/01611194.2011.632807","volume":"36","author":"N.T. Courtois","year":"2012","unstructured":"Courtois, N.T.: Security Evaluation of GOST 28147-89 in View of International Standardisation. Cryptologia\u00a036(1), 2\u201313 (2012)","journal-title":"Cryptologia"},{"key":"8_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"9","DOI":"10.1007\/978-3-642-34047-5_2","volume-title":"Fast Software Encryption","author":"I. Dinur","year":"2012","unstructured":"Dinur, I., Dunkelman, O., Shamir, A.: Improved Attacks on Full GOST. In: Canteaut, A. (ed.) FSE 2012. LNCS, vol.\u00a07549, pp. 9\u201328. Springer, Heidelberg (2012)"},{"key":"8_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"290","DOI":"10.1007\/978-3-642-21702-9_17","volume-title":"Fast Software Encryption","author":"T. Isobe","year":"2011","unstructured":"Isobe, T.: A Single-Key Attack on the Full GOST Block Cipher. In: Joux, A. (ed.) FSE 2011. LNCS, vol.\u00a06733, pp. 290\u2013305. Springer, Heidelberg (2011)"},{"key":"8_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"294","DOI":"10.1007\/978-3-540-89754-5_23","volume-title":"Progress in Cryptology - INDOCRYPT 2008","author":"O. Kara","year":"2008","unstructured":"Kara, O.: Reflection Cryptanalysis of Some Ciphers. In: Chowdhury, D.R., Rijmen, V., Das, A. (eds.) INDOCRYPT 2008. LNCS, vol.\u00a05365, pp. 294\u2013307. Springer, Heidelberg (2008)"},{"key":"8_CR8","unstructured":"Zabotin, I.A., Glazkov, G.P., Isaeva, V.B.: Cryptographic Protection for Information Processing Systems. Cryptographic Transformation Algorithm. Government Standard of the USSR, GOST 28147-89 (1989)"},{"key":"8_CR9","unstructured":"Zhu, B., Gong, G.: Multidimensional Meet-in-the-Middle Attack and Its Applications to GOST, KTANTAN and Hummingbird-2. Cryptology ePrint Archive, Report 2011\/619 (2011), \n                    \n                      http:\/\/eprint.iacr.org\/"}],"container-title":["Lecture Notes in Computer Science","Cryptology and Network Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-35404-5_8.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,5,4]],"date-time":"2021-05-04T13:15:07Z","timestamp":1620134107000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-35404-5_8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012]]},"ISBN":["9783642354038","9783642354045"],"references-count":9,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-35404-5_8","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2012]]}}}